Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Got ChatGPT Plus? You can record and summarize meetings on a Mac now – here’s how

      July 17, 2025

      I put this buzzworthy 2-in-1 robot vacuum to work in my house – here’s how it fared

      July 17, 2025

      AI agents will change work and society in internet-sized ways, says AWS VP

      July 17, 2025

      This slick gadget is like a Swiss Army Knife for my keys (and fully trackable)

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Notes Android App Using SQLite

      July 17, 2025

      How to Get Security Patches for Legacy Unsupported Node.js Versions

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft says it won’t change Windows 11’s system tray design after users feedback

      July 17, 2025
      Recent

      Microsoft says it won’t change Windows 11’s system tray design after users feedback

      July 17, 2025

      How Rust’s Debut in the Linux Kernel is Shoring Up System Stability

      July 17, 2025

      Microsoft is on track to become the second $4 trillion company by market cap, following NVIDIA — and mass layoffs

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ex-Army Soldier Cameron John Wagenius Pleads Guilty to $1M Cyber Extortion Scheme

    Ex-Army Soldier Cameron John Wagenius Pleads Guilty to $1M Cyber Extortion Scheme

    July 17, 2025

    Cameron John Wagenius

    A former US Army soldier posted in Texas has pleaded guilty to charges linked to a large scale cybercrime conspiracy that involved hacking into telecommunications companies’ networks, stealing sensitive data, and demanding ransom under threat of public exposure. Cameron John Wagenius, 21, self-confessed to his role in a plot to infiltrate at least 10 organizations between April 2023 and December 18, 2024.

    The court documents reveal that while still serving in the military, Wagenius was actively involved in cybercriminal operations using the online alias “kiberphant0m.”

    Ex-Army Soldier Hacking Case

    According to prosecutors, Cameron John Wagenius and his co-conspirators used hacking tools such as SSH Brute to obtain login credentials for protected systems. They reportedly communicated through encrypted Telegram group chats where they shared stolen credentials and planned how to gain unauthorized access to corporate networks.

    Once inside, the group stole sensitive information and launched extortion campaigns. The threats were made both in private messages to the affected companies and in public forums such as BreachForums and XSS.is, well-known platforms for cybercriminal activity.

    In these posts, the conspirators not only threatened to leak the stolen data but also offered it for sale, sometimes demanding thousands of dollars per transaction.

    $1 Million Extortion Attempt and SIM-Swapping Fraud

    The Justice Department reported that the group attempted to extort at least $1 million from the victim organizations. They also used the stolen data for further fraud schemes, including SIM-swapping, a technique that allows hackers to take control of victims’ phone numbers to bypass two-factor authentication and gain access to email, banking, and other sensitive accounts.

    Cameron John Wagenius pleaded guilty to conspiracy to commit wire fraud, extortion in relation to computer fraud, and aggravated identity theft. He is currently awaiting sentencing, which is scheduled for October 6.

    If convicted on all charges, Wagenius faces a maximum of 20 years in prison for conspiracy to commit wire fraud, up to 5 years for computer-related extortion, and a mandatory two-year sentence for aggravated identity theft, which would run consecutively to any other prison time.

    Cameron John Wagenius: Previous Guilty Plea in Phone Records Case

    Cameron John Wagenius had previously pleaded guilty in a separate case to two counts involving the unlawful transfer of confidential phone records. That case is also connected to the broader hacking conspiracy.

    Officials who announced the plea include Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division, Acting U.S. Attorney Teal Luthy Miller for the Western District of Washington, Assistant Director Brett Leatherman of the FBI’s Cyber Division, and Special Agent in Charge Kenneth DeChellis of the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Cyber Field Office.

    The FBI and DCIS led the investigation. Additional support was provided by the U.S. Army’s Criminal Investigative Division, the U.S. Attorney’s Office for the Western District of Texas, and the National Security Cyber Section. Cyber threat intelligence firms Flashpoint and Unit 221B also contributed to the investigation.

    Conclusion

    When someone with trusted access, like a soldier, misuses their skills for cybercrime, it raises bigger questions about how we train, monitor, and hold insiders accountable. Cameron John Wagenius, while still an active-duty soldier, used his access and experience to support and lead coordinated cyberattacks. The court will now assess the sentencing based on the U.S. Sentencing Guidelines and other statutory considerations. As the legal process continues, officials have emphasized that efforts to track down other conspirators and disrupt criminal marketplaces where stolen data is traded will remain a top priority.

    Companies handling sensitive data must stay one step ahead with stronger security checks, regular monitoring, and better collaboration with law enforcement. Trust is important, but when it comes to data security, trust alone isn’t enough.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article10 Best DevOps Automation Tools in 2025
    Next Article This “smart coach” helps LLMs switch between text and code

    Related Posts

    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 17, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-27010 – Tastyc PHP Path Traversal Local File Inclusion

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6557 – Google Chrome DevTools Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev

    Security

    New Opossum Attack Allows Hackers to Compromise Secure TLS Channels with Malicious Messages

    Security

    Highlights

    The AI Fix #47: An AI is the best computer programmer in the world

    April 22, 2025

    In episode 47 of The AI Fix, o3 becomes the best competitive programmer in the…

    CVE-2025-47287 – Tornado Multipart Form Data Denial of Service Vulnerability

    May 15, 2025

    Write for Us – Technology, Business & Marketing

    April 15, 2025

    NVIDIA to manufacture AI supercomputers in the U.S. for the first time

    April 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.